IPv6 security and network protocols security
Get news and best practices on IPv6 security and network protocols such as VoIP, TCP/IP, FTP and more. Learn how to protect data and secure communication to prevent cyberattacks and stay up to speed on the latest flaw, vulnerabilities and exploits in popular network protocols.
New & Notable
IPv6 security and network protocols security News
-
June 09, 2020
09
Jun'20
'CallStranger' vulnerability affects billions of UPNP devices
A new vulnerability in the Universal Plug and Play protocol could be used to exfiltrate enterprise data and launch DDoS attacks, and patches may not arrive for a long time.
-
February 05, 2020
05
Feb'20
Cisco Discovery Protocol flaws jeopardize 'tens of millions' of devices
Armis Security disclosed five vulnerabilities, dubbed 'CDPwn,' in Cisco's Discovery Protocol, which impact 'tens of millions' of Cisco devices such as routers and IP phones.
-
May 06, 2019
06
May'19
Cisco SSH vulnerability sparks debate over backdoors
Cisco released a patch for a critical vulnerability in Nexus 9000 switches that could allow a remote attacker to gain root access because of the use of a default SSH key pair.
-
January 03, 2018
03
Jan'18
Risk & Repeat: The TLS 1.3 clock continues to click
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the long wait for TLS 1.3 and the effects -- positive and negative -- the delays have had for enterprise security.
IPv6 security and network protocols security Get Started
Bring yourself up to speed with our introductory content
-
12 common network protocols and their functions explained
Networking makes the internet work, but neither can succeed without protocols. Common network protocols and functions are key for communication and connection across the internet. Continue Reading
-
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. Continue Reading
-
Secure Shell (SSH)
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Continue Reading
Evaluate IPv6 security and network protocols security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
6 firewall selection criteria to purchase NGFWs
These six key factors will help your company determine the best NGFW product for your organization's needs. Continue Reading
-
Next-generation firewall comparison based on company needs
Compare leading next-generation firewalls to help find the option that best fits your IT environment and security needs. Continue Reading
-
Next-generation firewalls vs. traditional and UTMs
Learn the advantages of next-generation firewalls that protect enterprise networks from attacks and intrusion, as well as the differences between NGFWs and traditional firewalls. Continue Reading
Manage IPv6 security and network protocols security
Learn to apply best practices and optimize your operations.
-
What are the top network security techniques for modern companies?
Protecting the enterprise network remains integral to overall IT security. Here are the top network security techniques enterprises are using to protect data. Continue Reading
-
How does BGP hijacking work and what are the risks?
The lack of security protections in BGP means that route hijacking can be easy, especially for organized crime or state-backed threat actors. Here are ways to deal with it. Continue Reading
-
Will DNS Flag Day affect you? Infoblox's Cricket Liu explains
What is DNS Flag Day? That's when old and broken DNS servers will stop working, improving DNS performance and safety for all. Infoblox's chief DNS architect Cricket Liu explains. Continue Reading
Problem Solve IPv6 security and network protocols security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
DNS threats emerge as IoT sticking point
Organizations can get wrapped up in the excitement of IoT technology and forget that older tech, including DNS, might not be up to supporting and securing new and old technology. Continue Reading
-
How can DNS privacy issues be addressed?
Learn two techniques for improving end-user DNS privacy protection that prevent DNS from exposing information about websites users visit and the people users communicate with. Continue Reading
-
How to detect and defend against a TCP port 445 exploit and attacks
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend against such attacks. Continue Reading